نتایج جستجو برای: text hiding

تعداد نتایج: 174024  

2016
Alfred Augustin Veena Kamath

This paper describes about transmitting secure text inside an audio file to prove that the text is safe and secures within the confines of it and suites the appropriateness of information security. In this paper, the proposed method can hide the desired message in the form of plain text using the Low-bit encoding algorithm. This method proves best effort service for securing and transmitting in...

2002
Mark Chapman George I. Davida

Information hiding has several applications, one of which is to hide the use of cryptography. The Nicetext [5, 6] system introduced a method for hiding cryptographic information by converting cryptographic strings (random-looking) into “nice text” (namely innocuous looking). The system retains the ability to recover the original ciphertext from the generated text. Nicetext can hide both plainte...

2010
Dipti Kapoor Sarmah Neha Bajpai

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are avai...

2015
Saurabh Singh Ashutosh Datar

In this paper, we proposed a hash based approach for color image steganography using canny edge detection method. One of the advantages of using edge detection technique is to secure our data. Proposed methodology follows encoding and decoding procedure. For encoding the data in an image we follow a steganography procedure. Steganography is the art of hiding information like-text, audio, video ...

2016
Kazumasa Shinagawa Koji Nuida Takashi Nishide Goichiro Hanaoka Eiji Okamoto

Lindell, Nissim, and Orlandi (ASIACRYPT 2013) studied feasibility and infeasibility of general two-party protocols that hide not only the contents of the inputs of parties, but also some sizes of the inputs and/or the output. In this paper, we extend their results to n-party protocols for n ≥ 2, and prove that it is infeasible to securely compute every function while hiding two or more (input o...

2010
Sujay Narayana Gaurav Prasad

The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography...

2015
V. Nandhini

This work proposes a novel scheme for HILL cipher algorithm based data hiding in encrypted texts. In the first work, a content owner encrypts the original uncompressed text using an encryption key. Then, it may compress the least significant bits of the encrypted text using a data-hiding key to create a sparse space to accommodate some additional data. The communication processes are still used...

2014
Gumma Prasad V.Sathya Narayanan

In any communication, security is the most important issue in today’s world. Security and data hiding algorithms have been developed, which worked as motivation for the research. This project is a data hiding by using side match vector quantization algorithm may used for data hiding scheme, which provides a strong backbone for its security. The scenario of present day of information security sy...

2013
Munkhbaatar Doyoddorj Chul Sur Youngho Park Kyung-Hyune Rhee

In this paper, a reversible data hiding scheme for color palette image is proposed. The technique of data embedding is used to hide the secret data into multimedia such as text contents, audio, video, and images. The reversibility of data hiding is an important requirement in some applications such as distance medical treatment and military industrial applications. In recent years, many researc...

2013
M. C. Padma

Using data hiding technique one can send the information to the accurate user without noticing to third person. Data can be hidden using different cover Medias, like video, audio, images or text. As an Internet based communications of images have increased, encryption of images has become very important way to protect images especially on the Internet. This work proposes a new scheme for hiding...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید